Super Tuesday is still offline. What’s the catch?

Even though the US is among the most technologically advanced nations in the world, most of its voters cannot cast their ballots online. Is internet voting a risk? Ondrej Kubovič reports.

5 threats every company needs to pay attention to

ESET’s Pablo Ramos takes a closer a look at the most common threats facing companies today and the impact that they can have.

The security review: porn clicker trojans at Google Play

Highlights from the past seven days in information security include porn clicker trojans at Google Play, digital childhoods and the security/privacy debate.

UC Berkeley hit with another cyberattack

UC Berkeley has revealed that it was the victim of a major cyberattack, affecting up to 80,000 current and former members of staff and students.

Razzies for malware: These were the worst performances of the year

Just as audiences have suffered from bad movie craftsmanship, IT users have had to endure the consequences of the malicious work done by malware authors. Welcome to Razzies for malware.

Why cybercrime isn’t fun and (video) games

Research shows that the average age of cybercrime suspects last year was just 17 years-old. We Live Security asks why, and suggests how you can protect your child.

Identity theft accounts for ‘majority of data breaches’

Theft of identities along with personal information still accounts for the majority of data breaches, a new global survey by Gemalto has found.

ESET expert: Google Play porn clicker ‘is a truly large-scale campaign’

Google Play porn clicker campaign: A single family of malicious apps masquerading as popular games or apps, designed to bypass Google’s security checks.

Porn clicker trojans keep flooding Google Play

ESET researchers have found 343 malicious porn clicker trojans on Google Play over the last seven months – and their numbers keep rising.

Porn clicker trojans at Google Play: An analysis

ESET researchers have found a large campaign of malicious porn clicker type apps on Google Play. These trojans belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

Privacy and security ‘war’ must come to an end

Cybersecurity experts are joining forces with government officials to try and “end the war between privacy and security”, it has been revealed.

The industrialization of cybercrime may be upon us

We are slowly seeing the industrialization of cybercrime according to an expert. Dr. Adrian Nish, head of cyber threat intelligence at BAE Systems, said that cybercriminals are becoming more “professionalized”.

Digital childhoods: How different nations bring up their kids

ESET has looked deeper into what parents in the United States, Germany, the United Kingdom and Russia regard as the appropriate age for digital activities.

4 internet-savvy countries agree: Kids go digital too early

Online surveys by ESET show that a majority of parents in Russia, the United Kingdom, Germany and the United States are not at all happy about their children going digital too early.

Linux Mint site hacked, users unwittingly download backdoored operating system

Linux users should not fool themselves into believing that they are somehow magically immune from malware attacks.

The security review: The state of security in companies in the EMEA region

Highlights from the past seven days in information security include the state of security in companies in the EMEA region and advice on support scams.

Average cost of cybercrime rises by 200% in just five years

Cybercrime is costing the global economy up to $450 billion annually, a new report by Hamilton Place Strategies reveals.

The Four “A”s of Account Management

It’s said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!

Apple and ‘exceptional access’ to crypto protection

Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.

Follow us

Copyright © 2017 ESET, All Rights Reserved.